ABSTRACT
Virtualization poses as the unavoidable catalyst for the integral restructuring of the future Internet. A considerable amount of techniques that embed virtual demands over physical resources in an optimal way, have already been proposed. The majority of these suggested strategies have adopted heuristic algorithms to generate acceptable, near optimal results in an affordable execution time. In this paper, we portray the importance of heuristic algorithms in the context of virtualization embedding processes and we thoroughly compare two of the most distinctive virtual mapping methodologies with similar objective functions that utilize heuristic algorithms to solve embedding scenarios. Our study confirms that the one stage scenario proves to produce more concrete results overall whereas the two-stage one constitutes a trustworthy option for better virtual resource distribution.
- 2020.Alevin2 - Tool for the evaluation of Algorithms for Embedding VIrtual Networks. https://sourceforge.net/p/alevin/wiki/home/Google Scholar
- Federico Alvarez 2019. An edge-to-cloud virtualized multimedia service platform for 5G networks. IEEE Transactions on Broadcasting65, 2(2019), 369–380.Google ScholarCross Ref
- Edoardo Amaldi, Stefano Coniglio, Arie MCA Koster, and Martin Tieves. 2016. On the computational complexity of the virtual network embedding problem. Electronic Notes in Discrete Mathematics52 (2016), 213–220.Google Scholar
- Paul Barham 2003. Xen and the art of virtualization. ACM SIGOPS operating systems review37, 5 (2003), 164–177.Google Scholar
- Sushil Bhardwaj, Leena Jain, and Sandeep Jain. 2010. Cloud computing: A study of infrastructure as a service (IAAS).International Journal of engineering and information Technology2, 1 (2010), 60–63.Google Scholar
- Haotong Cao, Han Hu, Zhicheng Qu, and Longxiang Yang. 2018. Heuristic solutions of virtual network embedding: A survey. China Communications15, 3 (2018), 186–219.Google ScholarCross Ref
- Giuseppa Caruso, Francesco Nucci, Oscar Prieto Gordo, Stamatia Rizou, Jacques Magen, George Agapiou, and Panagiotis Trakadas. 2019. Embedding5G solutions enabling new business scenarios in Media and Entertainment Industry. In2019 IEEE 2nd 5G World Forum (5GWF). IEEE, 460–464.Google Scholar
- NM Mosharaf Kabir Chowdhury, Muntasir Raihan Rahman, and Raouf Boutaba. 2009. Virtual network embedding with coordinated node and link mapping. InIEEE INFOCOM 2009. IEEE, 783–791.Google Scholar
- Ilhem Fajjari, Nadjib Aitsaadi, Guy Pujolle, and Hubert Zimmermann. 2011. Vnr algorithm: A greedy approach for virtual networks reconfigurations.In2011 IEEE Global Telecommunications Conference-GLOBECOM 2011. IEEE, 1–6.Google Scholar
- Andreas Fischer, Juan Felipe Botero, Michael Till Beck, Hermann De Meer, and Xavier Hesselbach. 2013. Virtual network embedding: A survey. IEEE Communications Surveys & Tutorials15, 4 (2013), 1888–1906.Google Scholar
- Jens Lischka and Holger Karl. 2009. A virtual network mapping algorithm based on subgraph isomorphism detection. In Proceedings of the 1st ACM workshop on Virtualized infrastructure systems and architectures. 81–88.Google ScholarDigital Library
- Manuel Peuster, Stefan Schneider, Mengxuan Zhao, George Xilouris, Panagiotis Trakadas, Felipe Vicens, Wouter Tavernier, Thomas Soenen, RicardVilalta, George Andreou, 2019. Introducing automated verification and validation for virtualized network functions and services. IEEE Communications Magazine57, 5 (2019), 96–102.Google ScholarCross Ref
- Stelios Prekas, Panagiotis Karkazis, and Panagiotis Trakadas. 2020. Comparison of Embedding Objectives for Next Generation Networks. In The Fifteenth International Multi-Conference on Computing in the Global Information Technology (Porto, Portugal, October 2020). XPS.Google Scholar
- Stamatia Rizou, Panagiotis Athanasoulis, Pasquale Andriani, Francesco Iadanza, Panagiotis Trakadas, David Griffin, Morteza Kheirkhah, DavidBreitgand, Avi Weit, Refik Fatih Ustok, 2020. Programmable Edge-to-Cloud Virtualization for 5G Media Industry: The 5G-MEDIA Approach. In IFIP International Conference on Artificial Intelligence Applications and Innovations. Springer, 95–104.Google ScholarCross Ref
- Alexander Schrijver. 1998.Theory of linear and integer programming. John Wiley & Sons.Google Scholar
- Thomas Soenen, Steven Van Rossem, Wouter Tavernier, Felipe Vicens, Dario Valocchi, Panos Trakadas, Panos Karkazis, George Xilouris, PhilipEardley, Stavros Kolometsos, 2018. Insights from SONATA: Implementing and integrating a microservice-based NFV service platform with a DevOps methodology. In NOMS 2018-2018 IEEE/IFIP Network Operations and Management Symposium. IEEE, 1–6.Google ScholarDigital Library
- Panagiotis Trakadas 2020. Comparison of Management and Orchestration Solutions for the 5G Era. Journal of Sensor and Actuator Networks9,1 (2020), 4.Google ScholarCross Ref
- Panagiotis Trakadas, Nikolaos Nomikos, Emmanouel T Michailidis, Theodore Zahariadis, Federico M Facca, David Breitgand, Stamatia Rizou, XaviMasip, and Panagiotis Gkonis. 2019. Hybrid clouds for data-Intensive, 5G-Enabled IoT applications: an overview, key issues and relevant architecture.Sensors19, 16 (2019), 3591.Google Scholar
- Kurt Tutschku, Thomas Zinner, Akihiro Nakao, and Phuoc Tran-Gia. 2009. Network virtualization: Implementation steps towards the future internet. Electronic Communications of the EASST17 (2009), 14. https://doi.org/10.14279/tuj.eceasst.17.216Google Scholar
- Minlan Yu, Yung Yi, Jennifer Rexford, and Mung Chiang. 2008. Rethinking virtual network embedding: substrate support for path splitting and migration. ACM SIGCOMM Computer Communication Review38, 2 (2008), 17–29.Google ScholarDigital Library
- Anastasios Zafeiropoulos, Eleni Fotopoulou, Manuel Peuster, Stefan Schneider, Panagiotis Gouvas, Daniel Behnke, Marcel Müller, Patrick-BenjaminBök, Panagiotis Trakadas, Panagiotis Karkazis, 2020. Benchmarking and Profiling 5G Verticals’ Applications: An Industrial IoT Use Case. In2020 6th IEEE Conference on Network Softwarization (NetSoft). IEEE, 310–318.Google Scholar
Recommendations
Mapping strategy for virtual networks in one stage
In the area of network virtualisation, virtual network embedding (VNE) refers to the resource allocation problem. In the literature, researchers have proposed multiple VNE algorithms. These algorithms have the goal of accommodating as many requested ...
A two-phase hybrid heuristic algorithm for the capacitated location-routing problem
In this paper, we propose a two-phase hybrid heuristic algorithm to solve the capacitated location-routing problem (CLRP). The CLRP combines depot location and routing decisions. We are given on input a set of identical vehicles (each having a capacity ...
An iterated greedy algorithm with optimization of partial solutions for the makespan permutation flowshop problem
We present a new iterated greedy algorithm for the permutation flowshop problem under makespan objective.Our algorithm applies local search on partial solutions after the destruction phase.Our algorithm compares favorably with others from the literature ...
Comments